More

Pages

Wednesday, 25 July 2012

Apple appeared at Black Hat Security conference


Apple will give the hacking community a peek under the hood of iOS this week, with the company’s first-ever presentation at the Black Hat security conference.

Bloombergs Jordan Robinson first reported the Apple appearance, which is scheduled for Thursday. Dallas De Atley, manager of Apples platform security team, will give the presentation.


Black Hats website describes the session: Apple designed the iOS platform with security at its core. In this talk, Dallas De Atley … will discuss key security technologies in iOS.

De Atleys appearance, however, would come when iOS security has been increasingly challenged. Earlier this month, a Russian hacker exploited a flaw in the operating system, letting the public make in-app purchases for free. A week before that, the Find and Call app was revealed to be a Trojan horse that uploaded a users contacts and SMS messages to a remote server. And the forthcoming release of iOS 6 is expected to contain numerous security improvements.

Black Hat general manager Trey Ford suggested to Bloomberg that De Atleys appearance is a coup for the conference. Bottom lineno one at Apple speaks without marketing approval, Ford told the news service. Apple will be at Black Hat 2012, and marketing is on board.

References: Link1

Defcon 20: Skillz, Thrillz & got Feelz for the whole Hacker Family


You might not think that a hacker conference in Sin City in the summer is the best place to take the kids. But if you want them to learn some skills, know their digital rights and have some fun, I can’t think of any place better. Oh, and there’s some stuff for us big kids too.

Defcon, which turns 20 this year, runs Friday through Sunday, following the more corporate Black Hat conference, the newsy parts of which are tomorrow and Thursday.




Black Hat organizers had a rocky start to their week with a security issue of their own. One of their volunteers sent 7,500 attendees a suspicious e-mail that appeared to be a phishing scam. The message asked recipients to confirm a new password that supposedly had been requested and directed them to a dicey-looking URL. “We have reviewed the server logs, we know the user, host, and have spoken with the volunteer who has emailed each of you this morning,” Trey Ford, general manager of Black Hat, wrote in a blog post, without saying exactly why it happened. “The email this morning wasn an abuse of functionality by a volunteer who has been spoken to.”

And in a first, Apple is hosting a talk at Black Hat to discuss security for its iOS mobile operating system. It’s a timely appearance: just last week, the iPad and iPhone maker offered developers a way to protect themselves from a high-profile exploit that targeted Apple’s in-app purchase system.

Defcon, meanwhile, will no doubt have plenty of hair-raising sessions about scary security holes in software and hardware we use every day and the tools released to help exploit them. But there also will be Defcon Kids, at which security researchers of the future will hone their chops on protecting data in a digital age.

The Defcon Kids program, which runs concurrently with Defcon and is now in its second year, looks seriously interesting. There will be sessions on how to break crypto code and how to work with electronics and circuit boards. There’s a panel on location data tracking in cell phones, a zero-day contest for finding previously unknown vulnerabilities, a lockpicking race, a Q&A session on drones and 3D printing, and a session on “The Art of the Con” with a live con game.

Attendees of Defcon Kids also will learn about liability and other issues related to design problems that allow locks and safes to be opened in seconds, and there’s a session called “Hacking your School’s Network” in which sci-fi author and Internet thinker Cory Doctorow will tell the kids that “the best way to hack the network is to study it, document the ways in which it interferes with your schooling, use Freedom of Information requests to find out what your school is paying for this junk, and publish and present that material.” The ACLU is holding a session on the NSA and the Constitution, and in the Department of Defense Crime Scene Investigation session, kids will confront a simulated crime that they have to solve in 15 minutes. Heady stuff for minors.

And there’s plenty of fun for the over-21 crowd too, including sessions on all manner of security topics like backdoors in hardware and industrial control software, hacking aircraft tracking systems, “human augmentation” using medicine and technology and how to hack a nation’s transportation networks. There are also plenty of privacy-related sessions and deep dives into the security architectures of iOS, Android, and Win 8.

For people who want a more hands-on experience, there’s an exploit-coding contest, a tamper-proof packaging contest, a Defcon art contest, capture the packet, lockpicking, social engineering contest and a beverage cooling contraption contest. For pure pleasure and good deeds you have the beard championship, along with bone marrow and blood drives. The winners of the Defcon short story contest will be announced, and people will be sharing anecdotes for the Defcon documentary that’s in the making. And if you just want to get out of town, there’s a two-hour bike ride in the desert being organized.

Things kick into another gear at night. After hours there will be the usual shmoozing over drinks, goth dance parties, and DJs from nerdcore rappers Duo Core and Dale Chase to MC Frontalot and local boys gone big, The Crystal Method.

There is also a separate event, B-Sides, that runs tomorrow and Thursday and features some interesting sessions like “How I Managed to Break into the InfoSec World with Only a Tweet and an Email” and “Dropping an Intelligent F-BOMB.”

Reference: Link1

‎400+ site Got Hacked and Defaced by 8lack 3y3s

3xp1r3 Cyber Army back again with fresh attack. This hacking group is really active in these days and already hack about 1,500+ sites in this month.
Bangladeshi hacking Group name as "3xp1r3 Cyber Army" hacked 400+ sites by 8lack 3y3s of different countries include lot of amount of Australian sites. These kind of attacks are clearly showing how much awareness about security is need in cyber world. 3xp1r3 Cyber Army already hack a 7,000+  sites and we can see all info of hacked sites on there zone-h.


The list of impacted sites was published on Pastebin yesterday, but at press time, most of them still weren’t restored.

"w3 ar3 3xp1r3

w3 n3v3r g1v3 uP...any lamers"


While these mass defacements may not seem to have devastating effects, many website owners complain that it takes quite an effort to fully recover after such a hack. Few days ago they also hack 860+ Sites Defaced By 3xp1r3 Cyber Army & 200+ Site Got Hacked by 8lack 3y3s

Hacked Site List:
http://pastebin.com/M6VzfR8a 

Zone-H Mirror:
http://zone-h.org/archive/notifier=3xp1r3

Zone-HACK Mirror:
http://www.zone-hack.com/notifier/3xp1r3/

Hack-DB Mirror:
http://hack-db.com/team/3xp1r3_Cyber_Army/all.html

z-z0ne Mirror:
http://z-z0ne.net/notifier/3xp1r3/


Australian Death Threat Text Scam under Investigation

Thousands of Australians have received a "death threat" text, demanding they pay 5,000 Australian dollars ($5,140, £3,311) or face being murdered.

The scale of the scam has surprised the police authorities.

At a press conference in Queensland, Det Supt Brian Hay said: "Do not respond. Delete it immediately and don't panic... because that's what they prey upon."

The fraud is believed to be the work of an organised crime gang.
Huge scale




The message, which began to hit people's phones on Monday, reads: "Sum1 paid me to kill you. Get spared, 48hrs to pay $5000. If you inform the police or anybody, death is promised."

It directs people to a Yahoo email account which police have now disabled.

Mr Hay told reporters that enquiries were ongoing as to whether the criminals were based in Australia.

Some people had already fallen for the scam, mainly those with little experience of text messaging, he revealed.

He said that the scale of the scam was "unprecedented".

"We've never see this anything like this before - to have so many people contacted at the same time."

"There is an extraordinary amount of Australian consumer data that they are exploiting," he added.

He added that the scam was likely to be the work of organised criminals rather than an individual.